abrt-action-analyze-xorg [-v] [-d DIR]
The tool reads the file named Xorg.0.log and checks if any black listed module was loaded. If so, not-reportable file is created with an appropriate explanation text. If no black listed module was loaded, the tool reads the file named backtrace from a problem data directory record and generates a duplication hash and a universally unique identifier (UUID). Then it saves this data as new elements duphash and uuid. abrt-action-analyze-xorg can be used to generate the duplication hash of a newly discovered Xorg backtraces.
Integration with ABRT events
EVENT=post-create analyzer=Xorg abrt-action-analyze-xorg
abrt-action-analyze-xorg can be used to generate the duplication hash of a newly discovered Xorg backtraces.
- -d DIR
Path to a problem directory. Current working directory is used when this option is not provided.
Be more verbose. Can be given multiple times.
Configuration file for ABRT’s tools which work with Xorg crashes
- ABRT team